User Tools

Site Tools



Cyber Buffet

Track Room Location: Heritage Hall, room 241

This track is now closed, but you may join the wait list and be notified if space opens up. Until that time, you will be enrolled in your alternate choice.

Learn a wide variety of cybersecurity topics with brief explanations, demonstrations and many hands-on projects, in a fun Capture The Flag-style gamified learning environment. The projects are designed to be dropped into your classes for immediate use, and will remain freely available after the workshop.

We will use a variety of virtual machines running locally or in the cloud, running Windows, Linux and Android.

We will cover these topics:

  • Securing Android Apps
  • Cryptography
  • Malware Analysis
  • Securing Web Apps

None - we will use only free online resources.

Participants should be familiar with networking and security at the Network+ and Security+ level.



Sam Bowne has been teaching computer networking and security classes at CCSF since 2000. He has given talks and hands-on trainings at DEFCON, HOPE, B-Sides SF, B-Sides LV, BayThreat, LayerOne, Toorcon, and many other schools and conferences.

He has a B.S. in Physics from Edinboro University of Pennsylvania and a Ph.D. in Physics from University of Illinois, Urbana-Champaign.

Industry Certification Exams & Prizes:
Infosec: CISSP, Certified Ethical Hacker, Security+, Defcon 21 CTP Co-Winner (Black Badge), Splunk Core Certified User
Networking: Network+, Certified Fiber Optic Technician, HE IPv6 Sage, CCENT, IPv6 Forum Silver & Gold, Juniper JN0-101, Wireshark WCNA Microsoft: MCP, MCDST, MCTS: Vista

Learn more about Sam here.

Three Objectives
At the completion of this track, the participants will be able to:
1. Find security flaws in mobile apps and web apps and correct them
2. Evaluate current encryption schemes and apply them correctly
3. Differentiate malware types using modern tools

Mon: Securing Android Apps
Tue: Cryptography
Wed: Malware Analysis
Thu: Securing Web Apps
Fri: Red v. Blue: In-Class Cybercompetition

Please note that content is subject to change or modification based on the unique needs of the track participants in attendance.

cyber.txt · Last modified: 2019/05/15 12:18 by admin